you are to idenitify a brute force password cracking tool that hackers may use. Research and report on how it is used, the platform/protocol/OS on which it is used. Provide detailed steps on how the tool is employed to level attacks. Include some screenshots of any of the commands that you decide to SAFELY and LEGALY try out..